Amjad Mehmood

Orcid: 0000-0003-3941-4617

According to our database1, Amjad Mehmood authored at least 44 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An optimal secure and reliable certificateless proxy signature for industrial internet of things.
Peer Peer Netw. Appl., July, 2024

Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review.
IEEE Trans. Intell. Transp. Syst., June, 2024

Performance Optimized Leader Selection Consensus Algorithm for Consortium Blockchain Using Trust Values of Nodes.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2024

2023
A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites.
Sensors, October, 2023

Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

2022
Safety, Security and Privacy in Machine Learning Based Internet of Things.
J. Sens. Actuator Networks, 2022

A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

2021
Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles.
Phys. Commun., 2021

Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles.
IEEE Access, 2021

2020
ELDC: An Artificial Neural Network Based Energy-Efficient and Robust Routing Scheme for Pollution Monitoring in WSNs.
IEEE Trans. Emerg. Top. Comput., 2020

A survey on intrusion detection and prevention in wireless ad-hoc networks.
J. Syst. Archit., 2020

FIPA-based reference architecture for efficient discovery and selection of appropriate cloud service using cloud ontology.
Int. J. Commun. Syst., 2020

Two New Improved Variants of Grey Wolf Optimizer for Unconstrained Optimization.
IEEE Access, 2020

Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles.
IEEE Access, 2020

An Effective Mechanism to Mitigate Real-Time DDoS Attack.
IEEE Access, 2020

2019
Innovative Citizen's Services through Public Cloud in Pakistan: User's Privacy Concerns and Impacts on Adoption.
Mob. Networks Appl., 2019

Authentication Techniques and Methodologies used in Wireless Body Area Networks.
J. Syst. Archit., 2019

Multi Modal Aptitude Detection System for Smart Office.
IEEE Access, 2019

Emotion Classification and Crowd Source Sensing; A Lexicon Based Approach.
IEEE Access, 2019

2018
NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks.
J. Supercomput., 2018

ESOT: a new privacy model for preserving location privacy in Internet of Things.
Telecommun. Syst., 2018

A Survey on Proactive, Active and Passive Fault Diagnosis Protocols for WSNs: Network Operation Perspective.
Sensors, 2018

Smart Road Traffic Accidents Reduction Strategy Based on Intelligent Transportation Systems (TARS).
Sensors, 2018

A Survey on Fault Diagnosis in Wireless Sensor Networks.
IEEE Access, 2018

Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless Sensor Networks.
IEEE Access, 2018

ANTSC: An Intelligent Naïve Bayesian Probabilistic Estimation Practice for Traffic Flow to Form Stable Clustering in VANET.
IEEE Access, 2018

SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System.
IEEE Access, 2018

2017
I-Marks: An iris code embedding system for ownership identification of multimedia content.
Comput. Electr. Eng., 2017

ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks.
Ad Hoc Networks, 2017

2016
A secure and low-energy zone-based wireless sensor networks routing protocol for pollution monitoring.
Wirel. Commun. Mob. Comput., 2016

SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks.
Secur. Commun. Networks, 2016

An online marking system conducive to learning.
J. Intell. Fuzzy Syst., 2016

Multimedia security in laboratory system based on cloud platform.
J. Intell. Fuzzy Syst., 2016

ESBL: An Energy-Efficient Scheme by Balancing Load in Group Based WSNs.
KSII Trans. Internet Inf. Syst., 2016

SALMA: An Efficient State-Based Hybrid Routing Protocol for Mobile Nodes in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

A Short Survey on Fault Diagnosis in Wireless Sensor Networks.
Proceedings of the Wireless Internet - 9th International Conference, 2016

2015
A Survey on State-of-the-Art Knowledge-based System Development and Issues.
Smart Comput. Rev., 2015

Smart Energy Efficient Hierarchical Data Gathering Protocols for Wireless Sensor Networks.
Smart Comput. Rev., 2015

Energy-efficient multi-level and distance-aware clustering mechanism for WSNs.
Int. J. Commun. Syst., 2015

Improvement of the Wireless Sensor Network Lifetime Using LEACH with Vice-Cluster Head.
Ad Hoc Sens. Wirel. Networks, 2015

2014
Multi-Agent based Framework for Secure and Reliable Communication among Open Clouds.
Netw. Protoc. Algorithms, 2014

2012
Effect of Fast Moving Object on RSSI in WSN: An Experimental Approach
CoRR, 2012

Web Accessibility for Disabled: A Case Study of Government Websites in Pakistan.
Proceedings of the 10th International Conference on Frontiers of Information Technology, 2012

2008
Adaptive Transport Protocols in Multi Agent System.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008


  Loading...